{"id":"https://openalex.org/W4312436789","doi":"https://doi.org/10.1109/idsta55301.2022.9923057","title":"Malware analysis and multi-label category detection issues: Ensemble-based approaches","display_name":"Malware analysis and multi-label category detection issues: Ensemble-based approaches","publication_year":2022,"publication_date":"2022-09-05","ids":{"openalex":"https://openalex.org/W4312436789","doi":"https://doi.org/10.1109/idsta55301.2022.9923057"},"language":"en","primary_location":{"id":"doi:10.1109/idsta55301.2022.9923057","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta55301.2022.9923057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075965221","display_name":"Izzat Alsmadi","orcid":"https://orcid.org/0000-0001-7832-5081"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Izzat Alsmadi","raw_affiliation_strings":["San Antonio,Department of computing and cyber security Texas A&#x0026;M,San Antonio,USA"],"affiliations":[{"raw_affiliation_string":"San Antonio,Department of computing and cyber security Texas A&#x0026;M,San Antonio,USA","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062333606","display_name":"Bilal Al\u2010Ahmad","orcid":"https://orcid.org/0000-0002-1267-1026"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bilal Al-Ahmad","raw_affiliation_strings":["The University of Jordan,Computer Information Systems Department,Aqaba,Jordan","Computer Information Systems Department, The University of Jordan, Aqaba, Jordan"],"affiliations":[{"raw_affiliation_string":"The University of Jordan,Computer Information Systems Department,Aqaba,Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"Computer Information Systems Department, The University of Jordan, Aqaba, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102775330","display_name":"Mohammad Ahmad Alsmadi","orcid":"https://orcid.org/0000-0002-6429-5229"},"institutions":[{"id":"https://openalex.org/I146367977","display_name":"Applied Science Private University","ror":"https://ror.org/01ah6nb52","country_code":"JO","type":"education","lineage":["https://openalex.org/I146367977"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Alsmadi","raw_affiliation_strings":["Applied Science University,Information Technology,Amman,Jordan","Information Technology, Applied Science University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Applied Science University,Information Technology,Amman,Jordan","institution_ids":["https://openalex.org/I146367977"]},{"raw_affiliation_string":"Information Technology, Applied Science University, Amman, Jordan","institution_ids":["https://openalex.org/I146367977"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075965221"],"corresponding_institution_ids":["https://openalex.org/I1335518801"],"apc_list":null,"apc_paid":null,"fwci":0.4458,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59834822,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"164","last_page":"169"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9688509702682495},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.819649875164032},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.67079758644104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6440314054489136},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.621522068977356},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5992588996887207},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5950656533241272},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4753696322441101},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.42095404863357544},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4104779362678528},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2281266152858734}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9688509702682495},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819649875164032},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.67079758644104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6440314054489136},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.621522068977356},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5992588996887207},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5950656533241272},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4753696322441101},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.42095404863357544},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4104779362678528},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2281266152858734},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idsta55301.2022.9923057","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta55301.2022.9923057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4285741730","https://openalex.org/W4292969247","https://openalex.org/W4281560664","https://openalex.org/W4308112567","https://openalex.org/W3151529617","https://openalex.org/W3013699712","https://openalex.org/W3162132941","https://openalex.org/W3136979370","https://openalex.org/W3117213758","https://openalex.org/W4293069612"],"abstract_inverted_index":{"Detection":[0],"of":[1,21,38,161],"malware":[2,25,31,41,62,67,82,103,132,165],"and":[3,16,51,71,125,150,170],"security":[4],"attacks":[5],"is":[6,34,143],"a":[7,30,60,148],"complex":[8],"process":[9],"that":[10,75,118],"can":[11,78,128],"vary":[12],"in":[13,113,137,146],"its":[14],"details":[15],"analysis":[17],"activities.":[18],"As":[19],"part":[20],"the":[22,39,159],"detection":[23,83,133,153,160],"process,":[24],"scanners":[26,56],"try":[27],"to":[28,168],"categorize":[29],"once":[32],"it":[33],"detected":[35],"under":[36,63],"one":[37,66],"known":[40],"categories":[42],"(e.g.":[43],"worms,":[44],"spywares,":[45],"viruses,":[46],"etc.).":[47],"However,":[48],"many":[49],"studies":[50],"researches":[52],"indicate":[53],"problems":[54],"with":[55,85,134,139],"categorizing":[57],"or":[58,107,163],"identifying":[59],"particular":[61],"more":[64],"than":[65],"category.":[68],"This":[69,142],"paper,":[70,92],"several":[72,95],"others,":[73],"show":[74],"machine":[76,120],"learning":[77,127],"be":[79,129],"used":[80,130],"for":[81,131],"especially":[84],"ensemble":[86,97,124],"base":[87],"prediction":[88],"methods.":[89],"In":[90],"this":[91],"we":[93],"evaluated":[94],"custom-built":[96],"models.":[98,141],"We":[99],"focused":[100],"on":[101],"multi-label":[102],"classification":[104],"as":[105,123,158],"individual":[106],"classical":[108,140],"classifiers":[109],"showed":[110,117],"low":[111],"accuracy":[112],"such":[114,122,147,157],"territory.This":[115],"paper":[116],"recent":[119],"models":[121],"deep":[126],"better":[135],"performance":[136],"comparison":[138],"very":[144],"critical":[145],"dynamic":[149],"yet":[151],"important":[152],"systems":[154],"where":[155],"challenges":[156],"unknown":[162],"zero-day":[164],"will":[166],"continue":[167],"exist":[169],"evolve.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
